Keyless entry system security enhancement

a keyless entry and security enhancement technology, applied in the field of keyless entry system security enhancement, can solve problems such as security vulnerabilities, and achieve the effect of enhancing the security of the keyless entry system

Active Publication Date: 2018-07-12
MITRE SPORTS INT LTD
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0006]In some embodiments, a method for enhancing security of a keyless entry system of a vehicle includes: receiving a keyless entry command at a first device, the keyless entry command executable by the keyless entry system; upon receiving the keyless entry command, suppressing the keyless entry command to prevent the keyless entry system from executing the keyless entry command; receiving authentication information from a second device; and upon verifying the authentication information against stored information, permitting the keyless entry system to execute the keyless entry command.

Problems solved by technology

As discussed above, keyless entry systems implemented in current vehicles have security vulnerabilities that can be exploited by unauthorized users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyless entry system security enhancement
  • Keyless entry system security enhancement
  • Keyless entry system security enhancement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Modern vehicles, particularly automobiles, can utilize wireless signals from a keyless entry remote to unlock a vehicle through a keyless entry system (KES). In particular, the KES may unlock the vehicle once the KES verifies that a wireless signal from the keyless entry remote corresponds to an authorized unlock code. However, such a KES can be vulnerable to attack and exploitation from malicious, unauthorized third parties who seek to gain unauthorized entry into the vehicle. For example, an unauthorized user may gain unauthorized access to modern vehicles by exploiting a vulnerability of the KES through an attack called “RollJam” or through an “amplification attack.”

[0041]A RollJam attack refers to a type of attack in which the unauthorized user operates a device to intercept communications between the keyless entry remote and a target vehicle. As the user (i.e., authorized user of the vehicle) attempts to unlock the vehicle, the unauthorized user can capture a first wirele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The keyless entry system (KES) controls access to a vehicle's doors, trunk, hood, etc., through a keyless entry device (e.g., a key fob) using wireless communication with the vehicle. The technology described here mitigates vulnerabilities in the KES implementation by employing a device configured to suppress a keyless entry command until an additional means of authentication is verified, at which point the keyless entry command is unsuppressed.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application claims the benefit of U.S. Provisional Application No. 62 / 444,692, filed on Jan. 10, 2017, the entire contents of which is incorporated herein by reference.FIELD OF THE DISCLOSURE[0002]This disclosure relates generally to enhancing the security of a keyless entry system implemented by a vehicle. More specifically, this disclosure relates to systems and methods that can deny unauthorized keyless commands from unlocking the vehicle while still allowing the vehicle to be eventually unlocked by an authorized user.BACKGROUND OF THE DISCLOSURE[0003]A modern car includes multiple electronic control units and numerous sensors to make the car safer, faster, and more efficient. This, however, can come at the cost of a cyber threat attack surface that grows by the day. The new technologies that are continually added to the modern car are often vulnerable to those with malicious intent.[0004]Research has revealed that certain vehicles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): B60R25/24
CPCB60R25/24H04W4/80G07C9/00309G07C2009/00793G07C2209/14H04L63/0853H04L2463/082H04W4/40H04W12/069G07C9/00
Inventor WOODILL, JR., JOHN ROBERTPAPALEO, ALBERTO ROLLAENGLE, ROBERT PERRYPIETRAVALLE, RICHARD JOSEPH
Owner MITRE SPORTS INT LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products